New Linux Security Book

Posted by VISITOR on Feb 6, 2005 2:10 PM EDT
www.packetattack.com; By Mike Sweeney
Mail this story
Print this story

We are proud to announce a new self published security book called "Network Security Using Linux".

Chapter 1
TCP/IP Fundamentals
Layers
TCP/IP Addressing
Subnetting with CIDR
Subnetting with VLSM
TCP/IP Version 6
IPv6 and the Kernel
Constructing Packets
TCP Communication
Any port will do
What does a router really do?
Open Source Linux Routers
Is a Linux router secure?
Shutting off the unwanted services
Chapter 2
Isn’t a router a firewall?
IP v6 and IPTables
Patch-O-Matic
Firewalling 101
Papers Please
The Penguin Builds a Wall
Bastille Linux
Free is good
IPCOP
Firestarter
Shorewall
Web Based Tools
Commercial Firewalls
Astaro
Smoothwall
Gibraltar
Resources
Chapter 3
IP Tables, Rules and Filters
Chain Syntax
Rules
Building of a Basic Rule
Demonstrating rules
Advanced Rules
Matching Connection States
Configuring NAT
Defending Against Basic Attacks
Examing The Rules
Strengthen Your Rules with ROPE
Your Basic Firewall
Firewall Testing
Firewall Script
Resources
Chapter 4
Updating Linux
RPMs
Red Hat Up2date
YUM
APT
What is a kernel update?
How do I tell which kernel I have installed?
How do I update the kernel?
Alternative Security Kernels
Keeping the LID on
Resources
Chapter 5
Encryption or protecting your Data
What is encryption?
What is this alphabet soup?
How does encryption work?
What are keys all about?
Why do I need encryption?
How do I use GPG?
Managing keys
Revoking a Key
Key Signing Parties
Additional Notes About GnuPG
Securing Data with SSH
What is OpenSSH?9
The basics of SSH
What else can SSH do?
SSH Port Forwarding
What is a X.509 Certificate?
Make Your Own Certificates
Are You Certified?
How to use the Certificate
Secure Socket Layer
SSL and Apache
Resources
Chapter 6
Detecting Intruders
Deploying an IDS
What is Snort
Building a Sensor
Secure Communications
Making the Pig Fly
Installing MySQL
Installing Snort
Snort Configuration
Syslog Notes
Configuring Snort’s New Database
Starting the Pig
Apache
Installing PHP
Snort on ACID
Securing the Pig
Multiple NIC cards
Rules? What Rules?
Updating the Rules
Deploying Snort
Tapping the network
Where to place Snort
Managing Snort
Webmin
Snort Center
Resources:
Chapter 7
Virtual Private Networks
IPsec
L2TP
PPTP
VPN Utilities
PPTP Client
OpenSwan
Installing and Configuring Openswan
Certificates and Keys
Configuration
Resources
Chapter 8
Logging for Fun and Profit
NTP for Linux
Monitoring and Analyzing the Logs
What to Look for
Tuning Syslog
Rotating Logs
Syslog Improved
Securing Syslog Traffic
Windows to Syslog Converters
Configuration Guides
Sawmill
Logwatch
Swatch
LogSurfer
Nagios
Resources
Chapter 9
Summary
Appendix 1
INDEX

Full Story

  Nav
» Read more about: Story Type: Press Release; Groups: Fedora

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.